[15:49:15][root@168.mr1370_220926_1234.el9.ppc64le]# './test_progs -t sk_storage_tracing' libbpf: prog 'trace_bpf_sk_storage_free': BPF program load failed: Invalid argument libbpf: prog 'trace_bpf_sk_storage_free': -- BEGIN PROG LOAD LOG -- R1 type=ctx expected=fp 0: R1=ctx(id=0,off=0,imm=0) R10=fp0 ; int BPF_PROG(trace_bpf_sk_storage_free, struct sock *sk) 0: (79) r2 = *(u64 *)(r1 +0) func 'bpf_sk_storage_free' arg0 has btf_id 2789 type STRUCT 'sock' 1: R1=ctx(id=0,off=0,imm=0) R2_w=ptr_sock(id=0,off=0,imm=0) ; value = bpf_sk_storage_get(&sk_stg_map, sk, 0, 1: (18) r1 = 0xc0000000b7aa7600 ; R1_w=map_ptr(id=0,off=0,ks=4,vs=4,imm=0) 3: (b7) r3 = 0 ; R3_w=inv0 4: (b7) r4 = 1 ; R4_w=inv1 5: (85) call bpf_sk_storage_get#107 helper call is not allowed in probe processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 -- END PROG LOAD LOG -- libbpf: failed to load program 'trace_bpf_sk_storage_free' libbpf: failed to load object 'test_sk_storage_trace_itself' libbpf: failed to load BPF skeleton 'test_sk_storage_trace_itself': -22 serial_test_sk_storage_tracing:PASS:test_sk_storage_trace_itself 0 nsec serial_test_sk_storage_tracing:PASS:test_sk_storage_tracing 0 nsec libbpf: prog 'trace_inet_csk_listen_start': failed to attach: ERROR: strerror_r(-524)=22 libbpf: failed to auto-attach program 'trace_inet_csk_listen_start': -524 serial_test_sk_storage_tracing:FAIL:test_sk_storage_tracing__attach unexpected error: -524 (errno 524) #128 sk_storage_tracing:FAIL All error logs: #128 sk_storage_tracing:FAIL libbpf: prog 'trace_bpf_sk_storage_free': BPF program load failed: Invalid argument libbpf: prog 'trace_bpf_sk_storage_free': -- BEGIN PROG LOAD LOG -- R1 type=ctx expected=fp 0: R1=ctx(id=0,off=0,imm=0) R10=fp0 ; int BPF_PROG(trace_bpf_sk_storage_free, struct sock *sk) 0: (79) r2 = *(u64 *)(r1 +0) func 'bpf_sk_storage_free' arg0 has btf_id 2789 type STRUCT 'sock' 1: R1=ctx(id=0,off=0,imm=0) R2_w=ptr_sock(id=0,off=0,imm=0) ; value = bpf_sk_storage_get(&sk_stg_map, sk, 0, 1: (18) r1 = 0xc0000000b7aa7600 ; R1_w=map_ptr(id=0,off=0,ks=4,vs=4,imm=0) 3: (b7) r3 = 0 ; R3_w=inv0 4: (b7) r4 = 1 ; R4_w=inv1 5: (85) call bpf_sk_storage_get#107 helper call is not allowed in probe processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 -- END PROG LOAD LOG -- libbpf: failed to load program 'trace_bpf_sk_storage_free' libbpf: failed to load object 'test_sk_storage_trace_itself' libbpf: failed to load BPF skeleton 'test_sk_storage_trace_itself': -22 serial_test_sk_storage_tracing:PASS:test_sk_storage_trace_itself 0 nsec serial_test_sk_storage_tracing:PASS:test_sk_storage_tracing 0 nsec libbpf: prog 'trace_inet_csk_listen_start': failed to attach: ERROR: strerror_r(-524)=22 libbpf: failed to auto-attach program 'trace_inet_csk_listen_start': -524 serial_test_sk_storage_tracing:FAIL:test_sk_storage_tracing__attach unexpected error: -524 (errno 524) Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED :: [ FAIL ] :: Command './test_progs -t sk_storage_tracing' (Expected 0, got 1, score 34) [15:49:16][root@168.mr1370_220926_1234.el9.ppc64le]# './test_progs -vv -t sk_storage_tracing' bpf_testmod.ko is already unloaded. Loading bpf_testmod.ko... Successfully loaded bpf_testmod.ko. libbpf: loading object 'test_sk_storage_trace_itself' from buffer libbpf: elf: section(2) .symtab, size 168, link 1, flags 0, type=2 libbpf: elf: section(3) fentry/bpf_sk_storage_free, size 88, link 0, flags 6, type=1 libbpf: sec 'fentry/bpf_sk_storage_free': found program 'trace_bpf_sk_storage_free' at insn offset 0 (0 bytes), code size 11 insns (88 bytes) libbpf: elf: section(4) license, size 4, link 0, flags 3, type=1 libbpf: license of test_sk_storage_trace_itself is GPL libbpf: elf: section(5) .maps, size 32, link 0, flags 3, type=1 libbpf: elf: section(6) .relfentry/bpf_sk_storage_free, size 16, link 2, flags 40, type=9 libbpf: elf: section(7) .BTF, size 850, link 0, flags 0, type=1 libbpf: elf: section(8) .BTF.ext, size 144, link 0, flags 0, type=1 libbpf: looking for externs among 7 symbols... libbpf: collected 0 externs total libbpf: map 'sk_stg_map': at sec_idx 5, offset 0. libbpf: map 'sk_stg_map': found type = 24. libbpf: map 'sk_stg_map': found key [2], sz = 4. libbpf: map 'sk_stg_map': found value [2], sz = 4. libbpf: map 'sk_stg_map': found map_flags = 0x1. libbpf: sec '.relfentry/bpf_sk_storage_free': collecting relocation for section(3) 'fentry/bpf_sk_storage_free' libbpf: sec '.relfentry/bpf_sk_storage_free': relo #0: insn #1 against 'sk_stg_map' libbpf: prog 'trace_bpf_sk_storage_free': found map 0 (sk_stg_map, sec 5, off 0) for insn #1 libbpf: loading kernel BTF '/sys/kernel/btf/vmlinux': 0 libbpf: map 'sk_stg_map': created successfully, fd=5 libbpf: prog 'trace_bpf_sk_storage_free': BPF program load failed: Invalid argument libbpf: prog 'trace_bpf_sk_storage_free': -- BEGIN PROG LOAD LOG -- R1 type=ctx expected=fp 0: R1=ctx(id=0,off=0,imm=0) R10=fp0 ; int BPF_PROG(trace_bpf_sk_storage_free, struct sock *sk) 0: (79) r2 = *(u64 *)(r1 +0) func 'bpf_sk_storage_free' arg0 has btf_id 2789 type STRUCT 'sock' 1: R1=ctx(id=0,off=0,imm=0) R2_w=ptr_sock(id=0,off=0,imm=0) ; value = bpf_sk_storage_get(&sk_stg_map, sk, 0, 1: (18) r1 = 0xc0000000af170600 ; R1_w=map_ptr(id=0,off=0,ks=4,vs=4,imm=0) 3: (b7) r3 = 0 ; R3_w=inv0 4: (b7) r4 = 1 ; R4_w=inv1 5: (85) call bpf_sk_storage_get#107 helper call is not allowed in probe processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 -- END PROG LOAD LOG -- libbpf: failed to load program 'trace_bpf_sk_storage_free' libbpf: failed to load object 'test_sk_storage_trace_itself' libbpf: failed to load BPF skeleton 'test_sk_storage_trace_itself': -22 serial_test_sk_storage_tracing:PASS:test_sk_storage_trace_itself 0 nsec libbpf: loading object 'test_sk_storage_tracing' from buffer libbpf: elf: section(2) .symtab, size 432, link 1, flags 0, type=2 libbpf: elf: section(3) tp_btf/inet_sock_set_state, size 136, link 0, flags 6, type=1 libbpf: sec 'tp_btf/inet_sock_set_state': found program 'trace_inet_sock_set_state' at insn offset 0 (0 bytes), code size 17 insns (136 bytes) libbpf: elf: section(4) fentry/inet_csk_listen_start, size 208, link 0, flags 6, type=1 libbpf: sec 'fentry/inet_csk_listen_start': found program 'trace_inet_csk_listen_start' at insn offset 0 (0 bytes), code size 26 insns (208 bytes) libbpf: elf: section(5) fentry/tcp_connect, size 208, link 0, flags 6, type=1 libbpf: sec 'fentry/tcp_connect': found program 'trace_tcp_connect' at insn offset 0 (0 bytes), code size 26 insns (208 bytes) libbpf: elf: section(6) fexit/inet_csk_accept, size 208, link 0, flags 6, type=1 libbpf: sec 'fexit/inet_csk_accept': found program 'inet_csk_accept' at insn offset 0 (0 bytes), code size 26 insns (208 bytes) libbpf: elf: section(7) .bss, size 16, link 0, flags 3, type=8 libbpf: elf: section(8) license, size 4, link 0, flags 3, type=1 libbpf: license of test_sk_storage_tracing is GPL libbpf: elf: section(9) .maps, size 64, link 0, flags 3, type=1 libbpf: elf: section(10) .reltp_btf/inet_sock_set_state, size 32, link 2, flags 40, type=9 libbpf: elf: section(11) .relfentry/inet_csk_listen_start, size 32, link 2, flags 40, type=9 libbpf: elf: section(12) .relfentry/tcp_connect, size 32, link 2, flags 40, type=9 libbpf: elf: section(13) .relfexit/inet_csk_accept, size 32, link 2, flags 40, type=9 libbpf: elf: section(14) .BTF, size 27763, link 0, flags 0, type=1 libbpf: elf: section(15) .BTF.ext, size 772, link 0, flags 0, type=1 libbpf: looking for externs among 18 symbols... libbpf: collected 0 externs total libbpf: map 'sk_stg_map': at sec_idx 9, offset 0. libbpf: map 'sk_stg_map': found type = 24. libbpf: map 'sk_stg_map': found key [2], sz = 4. libbpf: map 'sk_stg_map': found value [9], sz = 24. libbpf: map 'sk_stg_map': found map_flags = 0x1. libbpf: map 'del_sk_stg_map': at sec_idx 9, offset 32. libbpf: map 'del_sk_stg_map': found type = 24. libbpf: map 'del_sk_stg_map': found key [2], sz = 4. libbpf: map 'del_sk_stg_map': found value [2], sz = 4. libbpf: map 'del_sk_stg_map': found map_flags = 0x1. libbpf: map 'test_sk_.bss' (global data): at sec_idx 7, offset 0, flags 400. libbpf: map 2 is "test_sk_.bss" libbpf: sec '.reltp_btf/inet_sock_set_state': collecting relocation for section(3) 'tp_btf/inet_sock_set_state' libbpf: sec '.reltp_btf/inet_sock_set_state': relo #0: insn #3 against 'sk_stg_map' libbpf: prog 'trace_inet_sock_set_state': found map 0 (sk_stg_map, sec 9, off 0) for insn #3 libbpf: sec '.reltp_btf/inet_sock_set_state': relo #1: insn #11 against 'del_sk_stg_map' libbpf: prog 'trace_inet_sock_set_state': found map 1 (del_sk_stg_map, sec 9, off 32) for insn #11 libbpf: sec '.relfentry/inet_csk_listen_start': collecting relocation for section(4) 'fentry/inet_csk_listen_start' libbpf: sec '.relfentry/inet_csk_listen_start': relo #0: insn #1 against 'sk_stg_map' libbpf: prog 'trace_inet_csk_listen_start': found map 0 (sk_stg_map, sec 9, off 0) for insn #1 libbpf: sec '.relfentry/inet_csk_listen_start': relo #1: insn #19 against 'task_comm' libbpf: prog 'trace_inet_csk_listen_start': found data map 2 (test_sk_.bss, sec 7, off 0) for insn 19 libbpf: sec '.relfentry/tcp_connect': collecting relocation for section(5) 'fentry/tcp_connect' libbpf: sec '.relfentry/tcp_connect': relo #0: insn #1 against 'sk_stg_map' libbpf: prog 'trace_tcp_connect': found map 0 (sk_stg_map, sec 9, off 0) for insn #1 libbpf: sec '.relfentry/tcp_connect': relo #1: insn #19 against 'task_comm' libbpf: prog 'trace_tcp_connect': found data map 2 (test_sk_.bss, sec 7, off 0) for insn 19 libbpf: sec '.relfexit/inet_csk_accept': collecting relocation for section(6) 'fexit/inet_csk_accept' libbpf: sec '.relfexit/inet_csk_accept': relo #0: insn #1 against 'sk_stg_map' libbpf: prog 'inet_csk_accept': found map 0 (sk_stg_map, sec 9, off 0) for insn #1 libbpf: sec '.relfexit/inet_csk_accept': relo #1: insn #19 against 'task_comm' libbpf: prog 'inet_csk_accept': found data map 2 (test_sk_.bss, sec 7, off 0) for insn 19 libbpf: loading kernel BTF '/sys/kernel/btf/vmlinux': 0 libbpf: map 'sk_stg_map': created successfully, fd=5 libbpf: map 'del_sk_stg_map': created successfully, fd=6 libbpf: map 'test_sk_.bss': created successfully, fd=7 libbpf: sec 'fentry/inet_csk_listen_start': found 1 CO-RE relocations libbpf: CO-RE relocating [23] struct task_struct: found target candidate [243] struct task_struct in [vmlinux] libbpf: prog 'trace_inet_csk_listen_start': relo #0: kind (0), spec is [23] struct task_struct.comm (0:108 @ offset 2800) libbpf: prog 'trace_inet_csk_listen_start': relo #0: matching candidate #0 [243] struct task_struct.comm (0:108 @ offset 2800) libbpf: prog 'trace_inet_csk_listen_start': relo #0: patched insn #12 (ALU/ALU64) imm 2800 -> 2800 libbpf: sec 'fentry/tcp_connect': found 1 CO-RE relocations libbpf: prog 'trace_tcp_connect': relo #0: kind (0), spec is [23] struct task_struct.comm (0:108 @ offset 2800) libbpf: prog 'trace_tcp_connect': relo #0: matching candidate #0 [243] struct task_struct.comm (0:108 @ offset 2800) libbpf: prog 'trace_tcp_connect': relo #0: patched insn #12 (ALU/ALU64) imm 2800 -> 2800 libbpf: sec 'fexit/inet_csk_accept': found 1 CO-RE relocations libbpf: prog 'inet_csk_accept': relo #0: kind (0), spec is [23] struct task_struct.comm (0:108 @ offset 2800) libbpf: prog 'inet_csk_accept': relo #0: matching candidate #0 [243] struct task_struct.comm (0:108 @ offset 2800) libbpf: prog 'inet_csk_accept': relo #0: patched insn #12 (ALU/ALU64) imm 2800 -> 2800 serial_test_sk_storage_tracing:PASS:test_sk_storage_tracing 0 nsec libbpf: prog 'trace_inet_csk_listen_start': failed to attach: ERROR: strerror_r(-524)=22 libbpf: failed to auto-attach program 'trace_inet_csk_listen_start': -524 serial_test_sk_storage_tracing:FAIL:test_sk_storage_tracing__attach unexpected error: -524 (errno 524) #128 sk_storage_tracing:FAIL All error logs: #128 sk_storage_tracing:FAIL Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED Successfully unloaded bpf_testmod.ko. :: [ FAIL ] :: Command './test_progs -vv -t sk_storage_tracing' (Expected 0, got 1, score 34) [15:49:16][root@168.mr1370_220926_1234.el9.ppc64le]# './test_progs-no_alu32 -t sk_storage_tracing' libbpf: prog 'trace_bpf_sk_storage_free': BPF program load failed: Invalid argument libbpf: prog 'trace_bpf_sk_storage_free': -- BEGIN PROG LOAD LOG -- R1 type=ctx expected=fp 0: R1=ctx(id=0,off=0,imm=0) R10=fp0 ; int BPF_PROG(trace_bpf_sk_storage_free, struct sock *sk) 0: (79) r2 = *(u64 *)(r1 +0) func 'bpf_sk_storage_free' arg0 has btf_id 2789 type STRUCT 'sock' 1: R1=ctx(id=0,off=0,imm=0) R2_w=ptr_sock(id=0,off=0,imm=0) 1: (b7) r6 = 1 ; R6_w=inv1 ; value = bpf_sk_storage_get(&sk_stg_map, sk, 0, 2: (18) r1 = 0xc000000147a15c00 ; R1_w=map_ptr(id=0,off=0,ks=4,vs=4,imm=0) 4: (b7) r3 = 0 ; R3_w=inv0 5: (b7) r4 = 1 ; R4_w=inv1 6: (85) call bpf_sk_storage_get#107 helper call is not allowed in probe processed 6 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 -- END PROG LOAD LOG -- libbpf: failed to load program 'trace_bpf_sk_storage_free' libbpf: failed to load object 'test_sk_storage_trace_itself' libbpf: failed to load BPF skeleton 'test_sk_storage_trace_itself': -22 serial_test_sk_storage_tracing:PASS:test_sk_storage_trace_itself 0 nsec serial_test_sk_storage_tracing:PASS:test_sk_storage_tracing 0 nsec libbpf: prog 'trace_inet_csk_listen_start': failed to attach: ERROR: strerror_r(-524)=22 libbpf: failed to auto-attach program 'trace_inet_csk_listen_start': -524 serial_test_sk_storage_tracing:FAIL:test_sk_storage_tracing__attach unexpected error: -524 (errno 524) #128 sk_storage_tracing:FAIL All error logs: #128 sk_storage_tracing:FAIL libbpf: prog 'trace_bpf_sk_storage_free': BPF program load failed: Invalid argument libbpf: prog 'trace_bpf_sk_storage_free': -- BEGIN PROG LOAD LOG -- R1 type=ctx expected=fp 0: R1=ctx(id=0,off=0,imm=0) R10=fp0 ; int BPF_PROG(trace_bpf_sk_storage_free, struct sock *sk) 0: (79) r2 = *(u64 *)(r1 +0) func 'bpf_sk_storage_free' arg0 has btf_id 2789 type STRUCT 'sock' 1: R1=ctx(id=0,off=0,imm=0) R2_w=ptr_sock(id=0,off=0,imm=0) 1: (b7) r6 = 1 ; R6_w=inv1 ; value = bpf_sk_storage_get(&sk_stg_map, sk, 0, 2: (18) r1 = 0xc000000147a15c00 ; R1_w=map_ptr(id=0,off=0,ks=4,vs=4,imm=0) 4: (b7) r3 = 0 ; R3_w=inv0 5: (b7) r4 = 1 ; R4_w=inv1 6: (85) call bpf_sk_storage_get#107 helper call is not allowed in probe processed 6 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 -- END PROG LOAD LOG -- libbpf: failed to load program 'trace_bpf_sk_storage_free' libbpf: failed to load object 'test_sk_storage_trace_itself' libbpf: failed to load BPF skeleton 'test_sk_storage_trace_itself': -22 serial_test_sk_storage_tracing:PASS:test_sk_storage_trace_itself 0 nsec serial_test_sk_storage_tracing:PASS:test_sk_storage_tracing 0 nsec libbpf: prog 'trace_inet_csk_listen_start': failed to attach: ERROR: strerror_r(-524)=22 libbpf: failed to auto-attach program 'trace_inet_csk_listen_start': -524 serial_test_sk_storage_tracing:FAIL:test_sk_storage_tracing__attach unexpected error: -524 (errno 524) Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED :: [ FAIL ] :: Command './test_progs-no_alu32 -t sk_storage_tracing' (Expected 0, got 1, score 34) === Dmesg result === :: [ FAIL ] :: Test '128..224 selftests: bpf_test_progs:sk_storage_tracing [FAIL]'